G06Q20/38215

SYSTEM AND METHOD FOR ONLINE TRANSACTIONS USING CRYPTOGRAPHIC DIGITAL TOKENS
20220005032 · 2022-01-06 ·

A system and method for online transactions using cryptographic digital tokens is disclosed. The system includes multiple interconnected transaction servers having corresponding digital ledgers. Each interconnected transaction server may include computer modules to facilitate establishment of a digital contract, generation of a smart contract and a cryptographic digital token corresponding to the digital contract, and storage of the digital contract, the smart contract, and the cryptographic digital token. The computer modules may also facilitate execution of the smart contract and transfer of the cryptographic digital token from a buyer to a seller. The method includes establishing the digital contract, generating the smart contract and the cryptographic digital coin corresponding to the digital contract, and storing the digital contract, the smart contract, and the cryptographic digital coin. The method also includes executing the smart contract and transferring the cryptographic digital coin from the buyer to the seller.

SYSTEMS AND METHODS FOR SECURE TRANSACTION REVERSAL

Examples describe data security for communication systems. One example includes validating a merchant system using merchant data and generating a set of merchant credentials. The set of merchant credentials is then used in authentication to facilitate a secure transaction, which involves automatically generating transaction data with a tokenized client account number associated with the secure transaction. A refund request associated with the secure transaction is received with the set of merchant credentials that are used for automatically authenticating the merchant system. The example then involves accessing a database that includes the transaction data for automatically facilitating settlement of a refund payment using the authenticated merchant system and the transaction data.

TOKEN PROCESSING WITH SELECTIVE DE-TOKENIZATION FOR PROXIMITY BASED ACCESS DEVICE INTERACTIONS
20220006636 · 2022-01-06 ·

A method includes providing an initial communication, by an access device to a user device. The access device can receive the user identifier and the access token and receive a secret associated with the user. The access device can determine, using the user identifier and/or the access token, if the transaction is authorized by an authorizing entity computer associated with the access device or by an authorizing entity not associated with the access device. If the transaction is authorized by the authorizing entity computer associated with the access device, the access device can transmit an authorization request message comprising the user identifier, the secret, and the access token to the authorizing entity computer. The authorizing entity computer validates the secret, retrieves a real credential of the user using the user identifier, and authorizes the transaction.

Access control system and method for use by an access device

Systems and methods are provided to allow a smart phone or any terminal to activate a door lock using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes a processor and a communication module. The process has control of a door lock and is able to receive a reservation certificate presented by a portable terminal through the communication module. The processor activates the door lock when a current reservation certificate has been presented.

Token-based system for excising data from databases

A message processing server includes a message processor, a network interface, and a memory storing a token database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The message processor receives, via the network interface, at least one authorization message that identifies one of the tokens, derives a first decrypted data layer from the first encrypted data layer of the token, and extracts from the first decrypted data layer a second pointer to a secondary database that stores a predetermined data value. The message processor excises the predetermined data value from the secondary database.

Digital certificate management method and apparatus, and electronic device
11218328 · 2022-01-04 · ·

Implementations of the present disclosure provide techniques to improve security in blockchain networks. In some implementations, a linking request is received from a node. The node requests to be linked to a blockchain network. The linking request includes a digital code. One or more consensus verification messages are received from one or more blockchain nodes of the blockchain network. Each consensus verification message indicates whether a respective blockchain node approves or denies the linking request. A consensus verification result is determined based on the one or more consensus verification messages. In response to determining that the linking request is approved by the one or more blockchain nodes, the digital code is stored into the blockchain network as a digital certificate of the node.

METHOD AND DEVICE FOR CONDUCTING A TRANSACTION BETWEEN A PLURALITY OF PARTITIONS OF A BLOCKCHAIN
20220122067 · 2022-04-21 ·

A method for conducting a transaction between a plurality of partitions of a blockchain. In the method: on the partitions, smart contracts are provided, through the contracts, state channels are anchored in the partitions, and the transaction between the partitions is carried out on the state channels.

Systems and methods for distributed management of negative certificates for blockchain-based value exchange transactions

A system and methods include a negative certificate authority for distributed management of negative certificates. An authorization restriction is associated with an untrusted user. A negative certificate generated for the untrusted user includes a public key associated with the untrusted user and an authorization restriction. The authorization restriction includes at least one global restriction, which is applicable to each consortium member that subscribes to the negative certificate. The authorization restriction includes at least one local restriction, which allows individual consortium members to further define their own locally applicable restrictions using the negative certificate authority. The negative certificate is accessible to each member of the consortium to enforce the authorization restriction against a transaction request. A secure contributor record including a unique cryptographically generated address is generated for each contributor. In some embodiments, the transaction request is a blockchain-based value exchange transaction, such as a payment transaction using fiat or math-based currency.

Secure remote payment transaction processing using a secure element

Embodiments of the present invention are directed to methods, apparatuses, computer readable media and systems for securely processing remote transactions. One embodiment of the invention is directed to a method of processing a remote transaction initiated by a mobile device. The method comprises receiving, by a mobile payment application on a secure memory of the mobile device, transaction data from a transaction processor application on the mobile device. The method further comprises validating that the transaction processor application is authentic and in response to validating the transaction processor application, providing encrypted payment credentials to the transaction processor application. The transaction processor application further initiates a payment transaction with a transaction processor server computer using the encrypted payment credentials.

Multi-approval system using M of N keys to restore a customer wallet
11216809 · 2022-01-04 · ·

A computing system that includes processor(s), memory(s) and a network interface that communicates with a customer device and a trusted third party. The at least one network interface is configured to receive, from the customer device, identity data for a customer and a request to restore a customer wallet. The at least one processor is configured to verify the identity data for the customer received from the customer device. When the at least one processor verifies the identity data for the customer received from the customer device, the at least one network interface is configured to communicate a request for a first key associated with the customer wallet to a key repository for the trusted third party. The at least one processor is configured to restore the customer wallet using the first key associated with the customer wallet and a second key associated with the customer wallet.